1
0
mirror of https://github.com/veracrypt/VeraCrypt.git synced 2025-11-13 03:48:26 -06:00
Commit Graph

221 Commits

Author SHA1 Message Date
Mounir IDRASSI
3281b276b6 Windows: Fix various warnings 2021-01-02 01:16:40 +01:00
Mounir IDRASSI
9881744c95 Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). System encryption still not implemented on ARM64 2021-01-02 01:16:31 +01:00
Mounir IDRASSI
1157971784 Windows: Update signed drivers to version 1.24.24 2020-12-13 01:00:47 +01:00
Mounir IDRASSI
21674c6aec Windows: Fix various compiler warnings 2020-12-11 23:42:14 +01:00
Mounir IDRASSI
b48d437c80 Windows Driver: Fix build error using Windows 10 WDK caused by name conflict for KeSaveExtendedProcessorState/KeRestoreExtendedProcessorState functions 2020-12-11 23:42:08 +01:00
Mounir IDRASSI
699a0a3ca5 Increment internal version to 1.24.20 and update release notes 2020-07-22 17:28:06 +02:00
Mounir IDRASSI
7a87141e53 Increment internal version to 1.24.19 2020-07-04 00:46:44 +02:00
Mounir IDRASSI
3f587a3629 Windows: Don't use API for Processor Groups support if there is only 1 CPU group in the system. This can fix slowness issue observed on some PCs with AMD CPUs. 2020-07-02 02:20:42 +02:00
Mounir IDRASSI
23d64ab195 Increment internal version to 1.24.18 and update signed Windows drivers. 2020-06-29 01:00:02 +02:00
Mounir IDRASSI
b270a453aa Windows: remove unused code targeting Windows 2000. 2020-06-28 01:06:14 +02:00
Mounir IDRASSI
7cb9b8dfc9 Windows: Update signed driver to version 1.24.17 2020-06-26 19:13:37 +02:00
Mounir IDRASSI
cb1efdc9ae Increment version to 1.24-Update7 2020-06-23 16:48:54 +02:00
Mounir IDRASSI
bec929ce03 Windows Driver: Use real disk sector size instead of generic 512 bytes value when probing disk real size 2020-06-21 17:42:08 +02:00
Mounir IDRASSI
0121dc0b81 Windows: Fix issue when RAM encryption used, AES selected and AES-NI not supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected by user. 2020-06-21 00:27:15 +02:00
Christopher Bergqvist
0a2c565aa9 Switch from auto_ptr to unique_ptr (#638) 2020-06-11 18:02:28 +02:00
Mounir IDRASSI
0127927b73 Windows: Update signed Windows driver to version 1.24.15 2020-03-11 14:01:41 +01:00
Mounir IDRASSI
8fa1596e73 Increment version to 1.24-Update5 and update signed Windows drivers. 2020-02-11 23:05:48 +01:00
Mounir IDRASSI
94d3a1919c Windows: Implement support for processor groups in the driver and fix build issues caused by previous implementation 2020-02-10 02:23:25 +01:00
Mounir IDRASSI
ed8068cbbd Increment version to 1.24-Update2 2019-12-10 11:10:24 +01:00
Mounir IDRASSI
5eaa204d83 Windows Driver: Reduce memory usage of IOCTL_DISK_VERIFY handler. Now we reader disk by chunks of at most 64 KiB. Fix https://github.com/veracrypt/VeraCrypt/issues/562. 2019-12-09 18:59:27 +01:00
Mounir IDRASSI
5e96a5c44c Windows: enhancements to the mechanism preserving file timestamps, especially for keyfiles. 2019-12-08 23:42:47 +01:00
Mounir IDRASSI
c035d703cb Windows: Update signed drivers 2019-11-07 00:48:16 +01:00
Mounir IDRASSI
b7a21b8a76 Windows Driver: Fix strange crashes caused by probably by APC queue issues from calls to IoBuildDeviceIoControlRequest and ZwCreate (cf https://www.osr.com/blog/2018/02/14/beware-iobuilddeviceiocontrolrequest/) 2019-11-07 00:48:09 +01:00
Mounir IDRASSI
4587472e87 Increment version to 1.24-Hotfix2 2019-11-07 00:48:01 +01:00
Mounir IDRASSI
fa3d4c79c9 Increment version to 1.24-Beta6 2019-10-02 11:40:08 +02:00
Mounir IDRASSI
3923d11c7b Windows Driver: Disable Hibernation when RAM encryption is enabled since we can't resume from Hibernation without RAM encryption keys (a chicken and egg situation) 2019-10-01 15:09:35 +02:00
Mounir IDRASSI
69df92c81d Increment version to 1.24-Beta5 2019-03-09 08:04:04 +01:00
Mounir IDRASSI
1bd3a6cc70 Windows Driver: fix BSOD when mounting outer volume with hidden volume protection if RAM encryption is enabled 2019-03-09 08:03:57 +01:00
Mounir IDRASSI
d6ce1db2a8 Increment version to 1.24-Beta4 and update release notes to clarify that password length increase applies only to non-system volumes. 2019-03-09 08:03:51 +01:00
Mounir IDRASSI
f780011a86 Windows Driver: fix BSOD when mounting hidden volume if RAM encryption is enabled 2019-03-08 01:02:57 +01:00
Mounir IDRASSI
5c934d8122 Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt driver 2019-03-03 23:48:49 +01:00
Mounir IDRASSI
8e39877054 Increment version to 1.24-Beta3. Update Release Notes. 2019-03-03 23:48:28 +01:00
Mounir IDRASSI
edd1b00126 Windows Driver: Enable RAM encryption only after its security parameters were created 2019-03-01 00:35:54 +01:00
Mounir IDRASSI
ae5eb73f93 Windows driver: call VcProtectKeys only when RAM encryption enabled although this function does nothing when RAM encryption is disabled. 2019-03-01 00:35:33 +01:00
Mounir IDRASSI
8d7a318795 Windows: use specific order for EFI boot arguments memory regions that matches the one used by EFI bootloader. 2019-03-01 00:35:20 +01:00
Mounir IDRASSI
cf48b532b4 Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha) 2019-03-01 00:35:13 +01:00
Mounir IDRASSI
86f0fde6e7 Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de) 2019-02-12 19:06:14 +01:00
Mounir IDRASSI
ba5da0946c Windows: Add implementation of ChaCha20 based random generator. Use it for driver need of random bytes (currently only wipe bytes but more to come later). 2019-02-08 01:50:12 +01:00
Mounir IDRASSI
e5b9cee868 Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy which is now disabled by default 2019-02-08 01:50:03 +01:00
Mounir IDRASSI
5d3278bcf2 Update Release Notes and other files for 1.24-Beta2 release 2019-02-01 13:02:01 +01:00
Mounir IDRASSI
5571a8ba6b Windows driver: better randomness for wipe bytes by always using Whirlpool hash of current time and random bytes retrieved using CPU RDRAND/RDSEED if available. 2019-02-01 00:36:19 +01:00
Mounir IDRASSI
b294cc2e1c Increment version to 1.24-Beta2 2019-01-28 17:16:41 +01:00
Mounir IDRASSI
cdd1179c63 Increase password maximum length to 128 bytes from 64 bytes 2019-01-28 17:16:33 +01:00
Mounir IDRASSI
54e46c260c Windows Driver: force the input size for some IOCTLs to have a fixed value 2019-01-28 17:16:23 +01:00
Mounir IDRASSI
a20b3083b0 Windows: Add a build configuration containing EFI bootloader signed with custom SecureBoot key instead 2019-01-26 01:20:51 +01:00
Mounir IDRASSI
d73b8bdf74 Windows: Increment driver version to 1.24.1.1 2019-01-22 09:53:32 +01:00
Mounir IDRASSI
ee0a2659da Windows driver: remove volumes master keys from CRYPTO_INFO since they are not needed after their key schedule is created 2019-01-21 00:45:31 +01:00
Mounir IDRASSI
27b3fee02d Windows: remove unused fields from CRYPTO_INFO structure 2019-01-21 00:45:23 +01:00
Mounir IDRASSI
d3e7ed96f3 Windows: Implement feature that enables clearing of encryption keys when a new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade). 2019-01-14 10:49:05 +01:00
Mounir IDRASSI
406adce424 Increment version to 1.24-Beta1 2019-01-14 10:48:41 +01:00